SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Consumers rely on businesses to keep their
personal information safe. Too few of those
businesses are actively protecting that data.
Here’s what’s gone wrong, and how
businesses should be responding.
Know your sensitive data, and the definitions
of the data types to be protected.
Compromised data can lead to identity theft,
bank account access, and other negative
impacts to your customers and your business.
PII and other sensitive data is increasingly dispersed,
today, with the rise of mobile computing, consumer
technology, and cloud computing.
The average organizational cost of a data breach
reached more than $6.3 million in 2015, an increase
of over $1M since 2013. — Ponemon
The problem of dispersed PII is gaining momentum.
Data sprawl has resulted in a loss of data visibility,
causing many businesses to significantly increase
their risks — and to worry their customers.
Personally Identifiable
Information (PII)
is the general term for “all about you”.
PII can include full name, address,
email address, social security or
national identification number,
passport number, credit card numbers,
date of birth, birthplace, biometric
information, and medical data.
Protected Health
Information (PHI)
includes an individual’s past, present,
or future physical or mental health
conditions wherein the data identifies
the individual.
Personal Credit
Information (PCI)
is any data related to financial credit,
such as information in an individual’s
credit cards or bank accounts, or the
agencies that report on payment
history.
Intellectual Property (IP)
refers to creations of the mind, such
as inventions; literary and artistic
works; designs; and symbols,
computer code, names, and images
used in commerce.
of business workers use
email to send classified or
confidential information:
payroll, customer data, financial
information, business plans, etc.
84%
of files uploaded to
cloud-based file
sharing services
contain sensitive PII.
21%
of all corporate data
uploaded to the cloud is in
a customer-relationship
management application (CRM), and
6% of it is sensitive data.
20%
BASIC DEFINITIONS
of healthcare
organizations, employees
store PHI data on their
computers; 41% of healthcare
organizations admit to not adequately
protecting endpoints.
52%
of business users have lost
an external or mobile
device containing sensitive
business or personal information.
31%
50%of the Global 1000
companies will
store customer-sensitive data in
the public cloud.
7% of cloud data is PII. By the end
of 2016, more than
@
At
WHERE
IN THE W
O
RLDIS
YOUR SENSITIVE DATA?
THE CHALLENGE OF DATA SPRAWL
THE PROBLEM IS GROWING
RISING WORLDWIDE REGULATIONS
WHAT YOU CAN DO
HOW DRUVA CAN HELP
IT PROS ARE NOT PREPARED
Sony’s PlayStation network
suffered a data breach in
April 2011, leaking PII data
from 77 million individuals. The massive Target data
breach so far has cost the
company at least $60 million
in direct expenses. Data from
the breach feeds into a vast
pool of PII data in which the
criminal underground trades
and aggregates.
AT&T was fined $25m for an
internal PII breach and for
failing to properly protect the
confidentiality of almost
280,000 customers’
proprietary information.
750,000 individuals’ PHI
was breached in the first
six months of 2014
because of theft, loss, or
improper disposal of an
endpoint device (laptop
or mobile device).
The U.S. Office of
Management and budget
reveals a data breach
compromising over 21
million individual records,
including social security
and fingerprint records.
of customers lose trust
in a company that
experiences a breach involving
their PII.
79%
2011
2012
2013
2014
2015
1
2
3
4
5
6
of the U.S. population can be uniquely identified using only
their gender, date of birth, and ZIP code. It’s not just the most
obvious types of PII, such as credit card numbers, that require
protection, according to the U.S. General Accounting Office.87%
1979, Germany: The first Federal Data Protection Act
(Bundesdatenschutzgesetz)
1983, Canada: The Canadian Privacy Act
1988, United Kingdom: United Kingdom Data Protection Act 1998 (DPA)
1995, European Union: The Data Protection Directive
2003, USA: California Online Privacy Protection Act (OPPA)
2004, Costa Rica: Costa Rica became the seventh Latin American
country to regulate PII data
2011, India: India passed a privacy act
2013, USA: Massachusetts Supreme Court ruled that ZIP codes are PII
The list of nations with strict laws regulating the
processing of personal data is growing.
IT organizations in the largest companies
are unprepared to protect PII.
Identify and Take Action Against Data Risks
Across Mobile and Distributed Data
Businesses can take steps to get ahead of
the risks and to reduce their exposure:
Druva's converged data protection brings datacenter class availability and
governance to the mobile workforce. Druva’s inSync proactive compliance
solution delivers new, enhanced governance-related capabilities that equip
organizations to stay on top of their data, where it’s located and how it’s
handled, while at the same time ensuring the integrity of that data if its
authenticity is called into question during litigation.
The new enhanced data governance
capabilities include:
Learn more about Druva’s
proactive compliance capabilities at
druva.com/proactivecompliance
Despite increasing pressure
on companies to show
compliance with global data
privacy and other industry-
specific regulations (HIPAA,
FINRA, GLBA, COPPA) that
apply to sensitive data, IT
lacks confidence to address
these complex issues.
Centralized
visibility
Automated data
monitoring for
compliance
Data governance
for Legal and
Compliance
http://resources.ipswitchft.com/rs/ipswitch2/images/eBook%20-%20Are%20employees%20putting%20your%20company%27s%20data%
20at%20risk.pdf
https://www.netskope.com/blog/netskope-cloud-report-look-compromised-credentials - Gartner, June 2015
https://www.skyhighnetworks.com/cloud-university/is-the-cloud-secure/Brief
Stolen and Lost devices are Putting Personal healthcare information at Risk: It’s time For Healthcare ciSos to close the Faucet of Data loss
From endpoints - Forrester, 2015
http://www.darkreading.com/attacks-and-breaches/sony-data-breach-cleanup-to-cost-$171-million/d/d-id/1097898?
http://www.oracle.com/us/corporate/profit/big-ideas/010312-data-1917731.html
http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis
http://www.csrps.com/faqs-0
http://www.visionpayments.com/faq/personally-identifiable-information/
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html
http://www.tomsguide.com/us/target-neiman-marcus-data-breach-faq,news-18199.html
http://www.eweek.com/security/personal-information-on-enterprise-devices-carries-security-risks.html
http://www.dhs.gov/sites/default/files/publications/privacy/Guidance/handbookforsafeguardingsensitivePII_march_2012_webversion.pdf
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks
http://www.bbc.com/news/business-25525621
http://blogs.wsj.com/cio/2015/07/10/the-morning-download-outdated-tech-infrastructure-led-to-massive-opm-breach/
Verizon 2015 Data Breach Investigations Report INTELLECTUAL PROPERTY THEFT
Sources:
of corporate data stored
in cloud environments is
not manged or controlled
by the IT department.
44%
of legal preservation requests now included mobile
device data; an often manually complicated and
error-prone process.26%
Identify and locate sensitive personal data.
such as PII, PHI, and PCI to ensure your enterprise is compliant
with regulations and that sensitive data is not somewhere it
should not be.
Centralize visibility of your data.
Gain visibility of important and anomalous user data and events
by bringing endpoints and cloud data into your overall data
governance initiatives. A unified view of data across dispersed
locations helps the IT department more easily locate and govern
data by source, compliance risk type, risk level, and user.
Find out who can access customer and
employee data.
Use federated search across business locations to identify and
thus control access. Search the extended network for data,
owners, and locations.
Implement secure technologies.
Demand data center-level performance even when the data you
seek is outside the corporate firewall. Ensure mobile devices
adhere to policies.
Retain data only as long as it’s needed.
IT should team up with compliance and legal departments to
better understand data retention policies. Keep only what you
need to keep based on legal requirements, and purge old data
that's no longer relevant to the business. The more you hold, the
more risk of exposure.
Automate risk identification.
Pay attention to business processes: understand, identify, and act
on data risks across the dispersed data environment.
In 2013, Barclays Bank was fined
after it was
discovered
the bank
failed to keep critical records.
$3.75M
of companies are
confident that they can
preserve data on mobile
devices for litigation, regulatory, or
investigative requirements.
51%
Insider and privilege
misuse was responsible
for 12% of IP theft.12%

Weitere ähnliche Inhalte

Was ist angesagt?

The Digital Talent Gap - Developing Skills for Today’s Digital Organizations
The Digital Talent Gap - Developing Skills for Today’s Digital OrganizationsThe Digital Talent Gap - Developing Skills for Today’s Digital Organizations
The Digital Talent Gap - Developing Skills for Today’s Digital OrganizationsCapgemini
 
Transform customer intelligence-Calculai
Transform customer intelligence-CalculaiTransform customer intelligence-Calculai
Transform customer intelligence-CalculaiAnupam Kundu
 
The Human Side of Data By Colin Strong
The Human Side of Data By Colin StrongThe Human Side of Data By Colin Strong
The Human Side of Data By Colin StrongMarTech Conference
 
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearUse AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearCognizant
 
Salesforce Basecamp Helsinki 8.5.2018 - Boston Consulting Group
Salesforce Basecamp Helsinki 8.5.2018 - Boston Consulting GroupSalesforce Basecamp Helsinki 8.5.2018 - Boston Consulting Group
Salesforce Basecamp Helsinki 8.5.2018 - Boston Consulting GroupSalesforce Finland
 
INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...
INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...
INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...Capgemini
 
Closing the Big Data Gap in Public Sector
Closing the Big Data Gap in Public SectorClosing the Big Data Gap in Public Sector
Closing the Big Data Gap in Public SectorSAP Asia Pacific
 
Spectrum Health System Case Study
Spectrum Health System Case StudySpectrum Health System Case Study
Spectrum Health System Case StudyHootsuite
 
Carousel30: Big data for digital marketers
Carousel30: Big data for digital marketersCarousel30: Big data for digital marketers
Carousel30: Big data for digital marketersCarousel30
 
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3Angela Sanfilippo
 
Improve Customer Experiences With Big Data #DataTalk
Improve Customer Experiences With Big Data #DataTalkImprove Customer Experiences With Big Data #DataTalk
Improve Customer Experiences With Big Data #DataTalkExperian_US
 
Data Ingestion Engine Theory
Data Ingestion Engine TheoryData Ingestion Engine Theory
Data Ingestion Engine TheoryJacob Brody
 
Addressing Cybersecurity Strategically
Addressing Cybersecurity Strategically Addressing Cybersecurity Strategically
Addressing Cybersecurity Strategically Symantec
 
Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...
Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...
Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...ANTS
 
The Work Ahead in Banking & Financial Services: The Digital Road to Financial...
The Work Ahead in Banking & Financial Services: The Digital Road to Financial...The Work Ahead in Banking & Financial Services: The Digital Road to Financial...
The Work Ahead in Banking & Financial Services: The Digital Road to Financial...Cognizant
 
Modernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsModernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsCognizant
 

Was ist angesagt? (20)

The Digital Talent Gap - Developing Skills for Today’s Digital Organizations
The Digital Talent Gap - Developing Skills for Today’s Digital OrganizationsThe Digital Talent Gap - Developing Skills for Today’s Digital Organizations
The Digital Talent Gap - Developing Skills for Today’s Digital Organizations
 
Transform customer intelligence-Calculai
Transform customer intelligence-CalculaiTransform customer intelligence-Calculai
Transform customer intelligence-Calculai
 
The Human Side of Data By Colin Strong
The Human Side of Data By Colin StrongThe Human Side of Data By Colin Strong
The Human Side of Data By Colin Strong
 
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearUse AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
 
FinTech survey 2015
FinTech survey 2015FinTech survey 2015
FinTech survey 2015
 
Salesforce Basecamp Helsinki 8.5.2018 - Boston Consulting Group
Salesforce Basecamp Helsinki 8.5.2018 - Boston Consulting GroupSalesforce Basecamp Helsinki 8.5.2018 - Boston Consulting Group
Salesforce Basecamp Helsinki 8.5.2018 - Boston Consulting Group
 
What Is the Future of Data Sharing?
What Is the Future of Data Sharing?What Is the Future of Data Sharing?
What Is the Future of Data Sharing?
 
INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...
INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...
INFOGRAPHIC: Fixing the Insurance Industry - how big data can transform custo...
 
Closing the Big Data Gap in Public Sector
Closing the Big Data Gap in Public SectorClosing the Big Data Gap in Public Sector
Closing the Big Data Gap in Public Sector
 
Spectrum Health System Case Study
Spectrum Health System Case StudySpectrum Health System Case Study
Spectrum Health System Case Study
 
Carousel30: Big data for digital marketers
Carousel30: Big data for digital marketersCarousel30: Big data for digital marketers
Carousel30: Big data for digital marketers
 
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
 
Improve Customer Experiences With Big Data #DataTalk
Improve Customer Experiences With Big Data #DataTalkImprove Customer Experiences With Big Data #DataTalk
Improve Customer Experiences With Big Data #DataTalk
 
Data Ingestion Engine Theory
Data Ingestion Engine TheoryData Ingestion Engine Theory
Data Ingestion Engine Theory
 
Addressing Cybersecurity Strategically
Addressing Cybersecurity Strategically Addressing Cybersecurity Strategically
Addressing Cybersecurity Strategically
 
Customer Journey Analytics and Big Data
Customer Journey Analytics and Big DataCustomer Journey Analytics and Big Data
Customer Journey Analytics and Big Data
 
Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...
Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...
Winterberry group - 2014 annual outlook - direct and digital marketing--dmcny...
 
The Work Ahead in Banking & Financial Services: The Digital Road to Financial...
The Work Ahead in Banking & Financial Services: The Digital Road to Financial...The Work Ahead in Banking & Financial Services: The Digital Road to Financial...
The Work Ahead in Banking & Financial Services: The Digital Road to Financial...
 
Modernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsModernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent Decisions
 
Digitising IT - reaching real-time
Digitising IT - reaching real-timeDigitising IT - reaching real-time
Digitising IT - reaching real-time
 

Andere mochten auch

CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
Unlocking Excellence with Agile Metrics
Unlocking Excellence with Agile MetricsUnlocking Excellence with Agile Metrics
Unlocking Excellence with Agile MetricsRally Software
 
Stakeholder Relationship Management Audit
Stakeholder Relationship Management AuditStakeholder Relationship Management Audit
Stakeholder Relationship Management AuditAnand Subramaniam
 
Tricks and tweaks for Google Analytics and Google Tag Manager
Tricks and tweaks for Google Analytics and Google Tag ManagerTricks and tweaks for Google Analytics and Google Tag Manager
Tricks and tweaks for Google Analytics and Google Tag ManagerSimo Ahava
 
5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE
5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE
5 Big Data Visualization Maps that Will Make Your HEAD EXPLODEBI Brainz
 
Data Culture Keynote and Exec Track Birm Dec 8th
Data Culture Keynote and Exec Track Birm Dec 8thData Culture Keynote and Exec Track Birm Dec 8th
Data Culture Keynote and Exec Track Birm Dec 8thJonathan Woodward
 
Winning Affluent Millennials: A LinkedIn and Ipsos Study
Winning Affluent Millennials: A LinkedIn and Ipsos StudyWinning Affluent Millennials: A LinkedIn and Ipsos Study
Winning Affluent Millennials: A LinkedIn and Ipsos StudyIpsos Business Consulting
 
This Isn't 'Big Data.' It's Just Bad Data.
This Isn't 'Big Data.' It's Just Bad Data.This Isn't 'Big Data.' It's Just Bad Data.
This Isn't 'Big Data.' It's Just Bad Data.Peter Orszag
 
Infographics Key Data KPI presentation slides
Infographics Key Data KPI presentation slidesInfographics Key Data KPI presentation slides
Infographics Key Data KPI presentation slidesPeter Zvirinsky
 
Big Data: The Force That’s Good for Consumers and Society
Big Data: The Force That’s Good for Consumers and SocietyBig Data: The Force That’s Good for Consumers and Society
Big Data: The Force That’s Good for Consumers and SocietyExperian_US
 
Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...
Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...
Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...Jonathan Gray
 
6 best practices in stakeholder engagement
6 best practices in stakeholder engagement6 best practices in stakeholder engagement
6 best practices in stakeholder engagementWayne Dunn
 
Using Analytics To Make Smart HR Decisions
Using Analytics To Make Smart HR DecisionsUsing Analytics To Make Smart HR Decisions
Using Analytics To Make Smart HR DecisionsBambooHR
 
Bridging the Gap Between Data Science & Engineer: Building High-Performance T...
Bridging the Gap Between Data Science & Engineer: Building High-Performance T...Bridging the Gap Between Data Science & Engineer: Building High-Performance T...
Bridging the Gap Between Data Science & Engineer: Building High-Performance T...ryanorban
 

Andere mochten auch (19)

CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Unlocking Excellence with Agile Metrics
Unlocking Excellence with Agile MetricsUnlocking Excellence with Agile Metrics
Unlocking Excellence with Agile Metrics
 
Stakeholder Relationship Management Audit
Stakeholder Relationship Management AuditStakeholder Relationship Management Audit
Stakeholder Relationship Management Audit
 
Tricks and tweaks for Google Analytics and Google Tag Manager
Tricks and tweaks for Google Analytics and Google Tag ManagerTricks and tweaks for Google Analytics and Google Tag Manager
Tricks and tweaks for Google Analytics and Google Tag Manager
 
Color of words
Color of wordsColor of words
Color of words
 
5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE
5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE
5 Big Data Visualization Maps that Will Make Your HEAD EXPLODE
 
Stakeholder Engagement
Stakeholder EngagementStakeholder Engagement
Stakeholder Engagement
 
PMP_Project Stakeholder Management
PMP_Project Stakeholder ManagementPMP_Project Stakeholder Management
PMP_Project Stakeholder Management
 
Measuring What Matters: Meaningful Metrics
Measuring What Matters: Meaningful MetricsMeasuring What Matters: Meaningful Metrics
Measuring What Matters: Meaningful Metrics
 
Big data story
Big data storyBig data story
Big data story
 
Data Culture Keynote and Exec Track Birm Dec 8th
Data Culture Keynote and Exec Track Birm Dec 8thData Culture Keynote and Exec Track Birm Dec 8th
Data Culture Keynote and Exec Track Birm Dec 8th
 
Winning Affluent Millennials: A LinkedIn and Ipsos Study
Winning Affluent Millennials: A LinkedIn and Ipsos StudyWinning Affluent Millennials: A LinkedIn and Ipsos Study
Winning Affluent Millennials: A LinkedIn and Ipsos Study
 
This Isn't 'Big Data.' It's Just Bad Data.
This Isn't 'Big Data.' It's Just Bad Data.This Isn't 'Big Data.' It's Just Bad Data.
This Isn't 'Big Data.' It's Just Bad Data.
 
Infographics Key Data KPI presentation slides
Infographics Key Data KPI presentation slidesInfographics Key Data KPI presentation slides
Infographics Key Data KPI presentation slides
 
Big Data: The Force That’s Good for Consumers and Society
Big Data: The Force That’s Good for Consumers and SocietyBig Data: The Force That’s Good for Consumers and Society
Big Data: The Force That’s Good for Consumers and Society
 
Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...
Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...
Ways of Seeing Data: Towards a Critical Literacy for Data Visualisations as R...
 
6 best practices in stakeholder engagement
6 best practices in stakeholder engagement6 best practices in stakeholder engagement
6 best practices in stakeholder engagement
 
Using Analytics To Make Smart HR Decisions
Using Analytics To Make Smart HR DecisionsUsing Analytics To Make Smart HR Decisions
Using Analytics To Make Smart HR Decisions
 
Bridging the Gap Between Data Science & Engineer: Building High-Performance T...
Bridging the Gap Between Data Science & Engineer: Building High-Performance T...Bridging the Gap Between Data Science & Engineer: Building High-Performance T...
Bridging the Gap Between Data Science & Engineer: Building High-Performance T...
 

Ähnlich wie Where In The World Is Your Sensitive Data?

Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERYashiVaidya
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Big Data And Information Privacy
Big Data And Information PrivacyBig Data And Information Privacy
Big Data And Information PrivacySandra Willey
 
The Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetThe Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetTracy Aldridge
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of DataKim Cook
 
Snowden And Privacy
Snowden And PrivacySnowden And Privacy
Snowden And PrivacyJen Williams
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 

Ähnlich wie Where In The World Is Your Sensitive Data? (20)

Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
Big Data And Information Privacy
Big Data And Information PrivacyBig Data And Information Privacy
Big Data And Information Privacy
 
The Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetThe Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The Internet
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
 
Snowden And Privacy
Snowden And PrivacySnowden And Privacy
Snowden And Privacy
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 

Mehr von Druva

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druvaDruva
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the FrontlinesDruva
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise BackupDruva
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival GuideDruva
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at riskDruva
 

Mehr von Druva (20)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival Guide
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at risk
 

Kürzlich hochgeladen

SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024Becky Burwell
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Vladislav Solodkiy
 
How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?sonikadigital1
 
ChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics InfrastructureChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics Infrastructuresonikadigital1
 
YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.JasonViviers2
 
Master's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationMaster's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationGiorgio Carbone
 
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxTINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxDwiAyuSitiHartinah
 
5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best PracticesDataArchiva
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityAggregage
 
AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)Data & Analytics Magazin
 
Virtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product IntroductionVirtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product Introductionsanjaymuralee1
 
MEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .pptMEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .pptaigil2
 
Mapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxMapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxVenkatasubramani13
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...PrithaVashisht1
 
The Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerThe Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerPavel Šabatka
 
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Guido X Jansen
 
CI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionCI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionajayrajaganeshkayala
 

Kürzlich hochgeladen (17)

SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023
 
How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?
 
ChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics InfrastructureChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics Infrastructure
 
YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.
 
Master's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationMaster's Thesis - Data Science - Presentation
Master's Thesis - Data Science - Presentation
 
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxTINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
 
5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
 
AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)
 
Virtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product IntroductionVirtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product Introduction
 
MEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .pptMEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .ppt
 
Mapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxMapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptx
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...
 
The Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerThe Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayer
 
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
 
CI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionCI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual intervention
 

Where In The World Is Your Sensitive Data?

  • 1. Consumers rely on businesses to keep their personal information safe. Too few of those businesses are actively protecting that data. Here’s what’s gone wrong, and how businesses should be responding. Know your sensitive data, and the definitions of the data types to be protected. Compromised data can lead to identity theft, bank account access, and other negative impacts to your customers and your business. PII and other sensitive data is increasingly dispersed, today, with the rise of mobile computing, consumer technology, and cloud computing. The average organizational cost of a data breach reached more than $6.3 million in 2015, an increase of over $1M since 2013. — Ponemon The problem of dispersed PII is gaining momentum. Data sprawl has resulted in a loss of data visibility, causing many businesses to significantly increase their risks — and to worry their customers. Personally Identifiable Information (PII) is the general term for “all about you”. PII can include full name, address, email address, social security or national identification number, passport number, credit card numbers, date of birth, birthplace, biometric information, and medical data. Protected Health Information (PHI) includes an individual’s past, present, or future physical or mental health conditions wherein the data identifies the individual. Personal Credit Information (PCI) is any data related to financial credit, such as information in an individual’s credit cards or bank accounts, or the agencies that report on payment history. Intellectual Property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, computer code, names, and images used in commerce. of business workers use email to send classified or confidential information: payroll, customer data, financial information, business plans, etc. 84% of files uploaded to cloud-based file sharing services contain sensitive PII. 21% of all corporate data uploaded to the cloud is in a customer-relationship management application (CRM), and 6% of it is sensitive data. 20% BASIC DEFINITIONS of healthcare organizations, employees store PHI data on their computers; 41% of healthcare organizations admit to not adequately protecting endpoints. 52% of business users have lost an external or mobile device containing sensitive business or personal information. 31% 50%of the Global 1000 companies will store customer-sensitive data in the public cloud. 7% of cloud data is PII. By the end of 2016, more than @ At WHERE IN THE W O RLDIS YOUR SENSITIVE DATA? THE CHALLENGE OF DATA SPRAWL THE PROBLEM IS GROWING RISING WORLDWIDE REGULATIONS WHAT YOU CAN DO HOW DRUVA CAN HELP IT PROS ARE NOT PREPARED Sony’s PlayStation network suffered a data breach in April 2011, leaking PII data from 77 million individuals. The massive Target data breach so far has cost the company at least $60 million in direct expenses. Data from the breach feeds into a vast pool of PII data in which the criminal underground trades and aggregates. AT&T was fined $25m for an internal PII breach and for failing to properly protect the confidentiality of almost 280,000 customers’ proprietary information. 750,000 individuals’ PHI was breached in the first six months of 2014 because of theft, loss, or improper disposal of an endpoint device (laptop or mobile device). The U.S. Office of Management and budget reveals a data breach compromising over 21 million individual records, including social security and fingerprint records. of customers lose trust in a company that experiences a breach involving their PII. 79% 2011 2012 2013 2014 2015 1 2 3 4 5 6 of the U.S. population can be uniquely identified using only their gender, date of birth, and ZIP code. It’s not just the most obvious types of PII, such as credit card numbers, that require protection, according to the U.S. General Accounting Office.87% 1979, Germany: The first Federal Data Protection Act (Bundesdatenschutzgesetz) 1983, Canada: The Canadian Privacy Act 1988, United Kingdom: United Kingdom Data Protection Act 1998 (DPA) 1995, European Union: The Data Protection Directive 2003, USA: California Online Privacy Protection Act (OPPA) 2004, Costa Rica: Costa Rica became the seventh Latin American country to regulate PII data 2011, India: India passed a privacy act 2013, USA: Massachusetts Supreme Court ruled that ZIP codes are PII The list of nations with strict laws regulating the processing of personal data is growing. IT organizations in the largest companies are unprepared to protect PII. Identify and Take Action Against Data Risks Across Mobile and Distributed Data Businesses can take steps to get ahead of the risks and to reduce their exposure: Druva's converged data protection brings datacenter class availability and governance to the mobile workforce. Druva’s inSync proactive compliance solution delivers new, enhanced governance-related capabilities that equip organizations to stay on top of their data, where it’s located and how it’s handled, while at the same time ensuring the integrity of that data if its authenticity is called into question during litigation. The new enhanced data governance capabilities include: Learn more about Druva’s proactive compliance capabilities at druva.com/proactivecompliance Despite increasing pressure on companies to show compliance with global data privacy and other industry- specific regulations (HIPAA, FINRA, GLBA, COPPA) that apply to sensitive data, IT lacks confidence to address these complex issues. Centralized visibility Automated data monitoring for compliance Data governance for Legal and Compliance http://resources.ipswitchft.com/rs/ipswitch2/images/eBook%20-%20Are%20employees%20putting%20your%20company%27s%20data% 20at%20risk.pdf https://www.netskope.com/blog/netskope-cloud-report-look-compromised-credentials - Gartner, June 2015 https://www.skyhighnetworks.com/cloud-university/is-the-cloud-secure/Brief Stolen and Lost devices are Putting Personal healthcare information at Risk: It’s time For Healthcare ciSos to close the Faucet of Data loss From endpoints - Forrester, 2015 http://www.darkreading.com/attacks-and-breaches/sony-data-breach-cleanup-to-cost-$171-million/d/d-id/1097898? http://www.oracle.com/us/corporate/profit/big-ideas/010312-data-1917731.html http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis http://www.csrps.com/faqs-0 http://www.visionpayments.com/faq/personally-identifiable-information/ http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html http://www.tomsguide.com/us/target-neiman-marcus-data-breach-faq,news-18199.html http://www.eweek.com/security/personal-information-on-enterprise-devices-carries-security-risks.html http://www.dhs.gov/sites/default/files/publications/privacy/Guidance/handbookforsafeguardingsensitivePII_march_2012_webversion.pdf http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks http://www.bbc.com/news/business-25525621 http://blogs.wsj.com/cio/2015/07/10/the-morning-download-outdated-tech-infrastructure-led-to-massive-opm-breach/ Verizon 2015 Data Breach Investigations Report INTELLECTUAL PROPERTY THEFT Sources: of corporate data stored in cloud environments is not manged or controlled by the IT department. 44% of legal preservation requests now included mobile device data; an often manually complicated and error-prone process.26% Identify and locate sensitive personal data. such as PII, PHI, and PCI to ensure your enterprise is compliant with regulations and that sensitive data is not somewhere it should not be. Centralize visibility of your data. Gain visibility of important and anomalous user data and events by bringing endpoints and cloud data into your overall data governance initiatives. A unified view of data across dispersed locations helps the IT department more easily locate and govern data by source, compliance risk type, risk level, and user. Find out who can access customer and employee data. Use federated search across business locations to identify and thus control access. Search the extended network for data, owners, and locations. Implement secure technologies. Demand data center-level performance even when the data you seek is outside the corporate firewall. Ensure mobile devices adhere to policies. Retain data only as long as it’s needed. IT should team up with compliance and legal departments to better understand data retention policies. Keep only what you need to keep based on legal requirements, and purge old data that's no longer relevant to the business. The more you hold, the more risk of exposure. Automate risk identification. Pay attention to business processes: understand, identify, and act on data risks across the dispersed data environment. In 2013, Barclays Bank was fined after it was discovered the bank failed to keep critical records. $3.75M of companies are confident that they can preserve data on mobile devices for litigation, regulatory, or investigative requirements. 51% Insider and privilege misuse was responsible for 12% of IP theft.12%